The session deserializer in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 mishandles multiple php_var_unserialize calls, which allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted session content.
http://php.net/ChangeLog-5.php
http://www.debian.org/security/2015/dsa-3358
http://www.securityfocus.com/bid/76734
http://www.securitytracker.com/id/1033548
Source: MITRE
Published: 2016-05-16
Updated: 2017-11-04
Type: NVD-CWE-Other
Base Score: 7.5
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 10
Severity: HIGH
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 3.9
Severity: CRITICAL
OR
cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.0:beta4:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.10:*:*:*:*:*:*:*
OR
cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions up to 5.4.44 (inclusive)
OR
cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.15:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.16:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.17:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.18:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.19:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.20:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.21:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.22:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.23:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.24:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.25:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.5.26:*:*:*:*:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
124996 | EulerOS Virtualization 3.0.1.0 : php (EulerOS-SA-2019-1543) | Nessus | Huawei Local Security Checks | high |
98805 | PHP 5.6.x < 5.6.13 Multiple Vulnerabilities | Web Application Scanning | Component Vulnerability | high |
119971 | SUSE SLES12 Security Update : php5 (SUSE-SU-2015:1633-1) | Nessus | SuSE Local Security Checks | high |
91704 | GLSA-201606-10 : PHP: Multiple vulnerabilities | Nessus | Gentoo Local Security Checks | critical |
91433 | F5 Networks BIG-IP : PHP vulnerabilities (SOL17377) | Nessus | F5 Networks Local Security Checks | high |
9324 | Mac OS X 10.9.5 or later < 10.11.1 Multiple Vulnerabilities | Nessus Network Monitor | Operating System Detection | critical |
89967 | Amazon Linux AMI : php54 (ALAS-2016-670) | Nessus | Amazon Linux Local Security Checks | high |
86829 | Mac OS X Multiple Vulnerabilities (Security Updates 2015-004 / 2015-007) | Nessus | MacOS X Local Security Checks | critical |
86654 | Mac OS X < 10.11.1 Multiple Vulnerabilities | Nessus | MacOS X Local Security Checks | critical |
86496 | Amazon Linux AMI : php55 (ALAS-2015-602) | Nessus | Amazon Linux Local Security Checks | high |
86495 | Amazon Linux AMI : php56 (ALAS-2015-601) | Nessus | Amazon Linux Local Security Checks | high |
86223 | Slackware 14.0 / 14.1 / current : php (SSA:2015-274-02) | Nessus | Slackware Local Security Checks | high |
86221 | Ubuntu 12.04 LTS / 14.04 LTS / 15.04 : php5 vulnerabilities (USN-2758-1) | Nessus | Ubuntu Local Security Checks | critical |
86183 | openSUSE Security Update : php5 (openSUSE-2015-609) | Nessus | SuSE Local Security Checks | high |
86030 | Fedora 23 : php-5.6.13-1.fc23 (2015-14978) | Nessus | Fedora Local Security Checks | high |
85934 | Fedora 22 : php-5.6.13-1.fc22 (2015-14977) | Nessus | Fedora Local Security Checks | high |
85933 | Fedora 21 : php-5.6.13-1.fc21 (2015-14976) | Nessus | Fedora Local Security Checks | high |
8861 | PHP 5.4.x < 5.4.45 / 5.5.x < 5.5.29 / 5.6.x < 5.6.13 Multiple Vulnerabilities | Nessus Network Monitor | Web Servers | critical |
85914 | Debian DSA-3358-1 : php5 - security update | Nessus | Debian Local Security Checks | high |
85887 | PHP 5.6.x < 5.6.13 Multiple Vulnerabilities | Nessus | CGI abuses | high |
85886 | PHP 5.5.x < 5.5.29 Multiple Vulnerabilities | Nessus | CGI abuses | high |
85885 | PHP 5.4.x < 5.4.45 Multiple Vulnerabilities | Nessus | CGI abuses | high |
85859 | FreeBSD : php -- multiple vulnerabilities (3d675519-5654-11e5-9ad8-14dae9d210b8) | Nessus | FreeBSD Local Security Checks | high |